2017
DOI: 10.1186/s13635-017-0055-6
|View full text |Cite
|
Sign up to set email alerts
|

Polymorphic malware detection using sequence classification methods and ensembles

Abstract: Identifying malicious software executables is made difficult by the constant adaptations introduced by miscreants in order to evade detection by antivirus software. Such changes are akin to mutations in biological sequences. Recently, high-throughput methods for gene sequence classification have been developed by the bioinformatics and computational biology communities. In this paper, we apply methods designed for gene sequencing to detect malware in a manner robust to attacker adaptations. Whereas most gene c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 45 publications
(19 citation statements)
references
References 21 publications
0
17
0
Order By: Relevance
“…Algorithm 1 is a straightforward implementation of signature de nition (9). First, the signature components are initialized with in nity.…”
Section: Bagminhash Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…Algorithm 1 is a straightforward implementation of signature de nition (9). First, the signature components are initialized with in nity.…”
Section: Bagminhash Algorithmmentioning
confidence: 99%
“…In the oncoming sections we will describe methods to make the calculation of the new signature much more e cient. e signature components de ned by (9) are all nonnegative real numbers. However, as mentioned in Section 1.1, integer values with a prede ned number of bits are o en more preferable.…”
Section: Bagminhash Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…Even though the Jaccard and minHash sketches are regularly used as a measure of the k-mer content similarity in computational biology software, the weighted Jaccard similarity has been heavily studied and used in other contexts, such as large database document classification and retrieval (e.g., Manasse et al, 2010;Shrivastava, 2016;Wu et al, 2017), near duplicate image detection (Chum et al, 2008), duplicate news story detection (Alonso et al, 2013), source code deduplication (Markovtsev and Kant, 2017), time series indexing (Luo and Shrivastava, 2017), hierarchical topic extraction (Gollapudi and Panigrahy, 2006), or malware classifcation (Drew et al, 2017) and detection (Raff and Nicholas, 2017).…”
Section: Weighted Jaccard and Omhmentioning
confidence: 99%
“…Recently some authors worked on malware dataset released for kaggle dataset [14]. In the year 2016, Ahmadi et al Drew et al [16] used The Super Threaded Reference Free Alignment-Free Nsequence Decoder (STRAND) classifier to perform classification of polymorphic malware. In their approach, they presented ASM sequence model and obtained accuracy greater than 98.59 % using 10-fold cross-validation.…”
Section: Related Workmentioning
confidence: 99%